-
Dormancy and Reawakening Over Years: Eight New Recurrent Changing-Look AGNs
Authors:
Shu Wang,
Jong-Hak Woo,
Elena Gallo,
Donghoon Son,
Qian Yang,
Junjie Jin,
Hengxiao Guo,
Minzhi Kong
Abstract:
We report the discovery of eight new recurrent changing-look (CL) active galactic nuclei (AGNs), including seven re-brightening turn-off AGNs and one fading turn-on AGN. These systems are valuable for placing constraints on the duration of dim and bright states, which may be linked to the AGN duty cycle or disk instability. Long-term optical light curve analysis reveals that many objects in our sa…
▽ More
We report the discovery of eight new recurrent changing-look (CL) active galactic nuclei (AGNs), including seven re-brightening turn-off AGNs and one fading turn-on AGN. These systems are valuable for placing constraints on the duration of dim and bright states, which may be linked to the AGN duty cycle or disk instability. Long-term optical light curve analysis reveals that many objects in our sample exhibit a prolonged plateau during the dim states lasting 4 to 7 years, with gradual turn-on/off process. We observe no significant difference between the turn-on and turn-off timescales, and this timescale is broadly consistent with the heating/cooling front propagation timescale. The comparison between optical and infrared variations supports that these transitions are driven by changes in accretion disk emission rather than dust obscuration. Our discovery significantly increases the previously identified recurrent CL AGN sample from eleven objects to nineteen, demonstrating that some AGNs can enter dormancy and reawaken on timescales of a few years, which provides useful information for understanding AGN episodic accretion.
△ Less
Submitted 20 October, 2024;
originally announced October 2024.
-
Black Hole Zeckendorf Games
Authors:
Caroline Cashman,
Steven J. Miller,
Jenna Shuffleton,
Daeyoung Son
Abstract:
Zeckendorf proved a remarkable fact that every positive integer can be written as a decomposition of non-adjacent Fibonacci numbers. Baird-Smith, Epstein, Flint, and Miller converted the process of decomposing a positive integer into its Zeckendorf decomposition into a game, using the moves of $F_i + F_{i-1} = F_{i+1}$ and $2F_i = F_{i+1} + F_{i-2}$, where $F_i$ is the $i$thFibonacci number. Playe…
▽ More
Zeckendorf proved a remarkable fact that every positive integer can be written as a decomposition of non-adjacent Fibonacci numbers. Baird-Smith, Epstein, Flint, and Miller converted the process of decomposing a positive integer into its Zeckendorf decomposition into a game, using the moves of $F_i + F_{i-1} = F_{i+1}$ and $2F_i = F_{i+1} + F_{i-2}$, where $F_i$ is the $i$thFibonacci number. Players take turns applying these moves, beginning with $n$ pieces in the $F_1$ column. They showed that for $n \neq 2$, Player 2 has a winning strategy, though the proof is non-constructive, and a constructive solution is unknown.
We expand on this by investigating "black hole'' variants of this game. The Black Hole Zeckendorf game on $F_m$ is played with any $n$ but solely in columns $F_i$ for $i < m$. Gameplay is similar to the original Zeckendorf game, except any piece that would be placed on $F_i$ for $i \geq m$ is locked out in a ``black hole'' and removed from play. With these constraints, we analyze the games with black holes on $F_3$ and $F_4$ and construct a solution for specific configurations, using a parity-stealing based non-constructive proof to lead to a constructive one. We also examine a pre-game in which players take turns placing down $n$ pieces in the outermost columns before the decomposition phase, and find constructive solutions for any $n$.
△ Less
Submitted 17 September, 2024;
originally announced September 2024.
-
Stability of Matrix Recurrence Relations
Authors:
Glenn Bruda,
Bruce Fang,
Pico Gilman,
Raul Marquez,
Steven J. Miller,
Beni Prapashtica,
Daeyoung Son,
Saad Waheed,
Janine Wang
Abstract:
Motivated by the rich properties and various applications of recurrence relations, we consider the extension of traditional recurrence relations to matrices, where we use matrix multiplication and the Kronecker product to construct matrix sequences. We provide a sharp condition, which when satisfied, guarantees that any fixed-depth matrix recurrence relation defined over a product (with respect to…
▽ More
Motivated by the rich properties and various applications of recurrence relations, we consider the extension of traditional recurrence relations to matrices, where we use matrix multiplication and the Kronecker product to construct matrix sequences. We provide a sharp condition, which when satisfied, guarantees that any fixed-depth matrix recurrence relation defined over a product (with respect to matrix multiplication) will converge to the zero matrix. We also show that the same statement applies to matrix recurrence relations defined over a Kronecker product. Lastly, we show that the dual of this condition, which remains sharp, guarantees the divergence of matrix recurrence relations defined over a consecutive Kronecker product. These results completely determine the stability of nontrivial fixed-depth complex-valued recurrence relations defined over a consecutive product.
△ Less
Submitted 22 August, 2024;
originally announced August 2024.
-
DEF-oriCORN: efficient 3D scene understanding for robust language-directed manipulation without demonstrations
Authors:
Dongwon Son,
Sanghyeon Son,
Jaehyung Kim,
Beomjoon Kim
Abstract:
We present DEF-oriCORN, a framework for language-directed manipulation tasks. By leveraging a novel object-based scene representation and diffusion-model-based state estimation algorithm, our framework enables efficient and robust manipulation planning in response to verbal commands, even in tightly packed environments with sparse camera views without any demonstrations. Unlike traditional represe…
▽ More
We present DEF-oriCORN, a framework for language-directed manipulation tasks. By leveraging a novel object-based scene representation and diffusion-model-based state estimation algorithm, our framework enables efficient and robust manipulation planning in response to verbal commands, even in tightly packed environments with sparse camera views without any demonstrations. Unlike traditional representations, our representation affords efficient collision checking and language grounding. Compared to state-of-the-art baselines, our framework achieves superior estimation and motion planning performance from sparse RGB images and zero-shot generalizes to real-world scenarios with diverse materials, including transparent and reflective objects, despite being trained exclusively in simulation. Our code for data generation, training, inference, and pre-trained weights are publicly available at: https://sites.google.com/view/def-oricorn/home.
△ Less
Submitted 30 July, 2024;
originally announced July 2024.
-
Semi-Supervised Learning for Anomaly Detection in Blockchain-based Supply Chains
Authors:
Do Hai Son,
Bui Duc Manh,
Tran Viet Khoa,
Nguyen Linh Trung,
Dinh Thai Hoang,
Hoang Trong Minh,
Yibeltal Alem,
Le Quang Minh
Abstract:
Blockchain-based supply chain (BSC) systems have tremendously been developed recently and can play an important role in our society in the future. In this study, we develop an anomaly detection model for BSC systems. Our proposed model can detect cyber-attacks at various levels, including the network layer, consensus layer, and beyond, by analyzing only the traffic data at the network layer. To do…
▽ More
Blockchain-based supply chain (BSC) systems have tremendously been developed recently and can play an important role in our society in the future. In this study, we develop an anomaly detection model for BSC systems. Our proposed model can detect cyber-attacks at various levels, including the network layer, consensus layer, and beyond, by analyzing only the traffic data at the network layer. To do this, we first build a BSC system at our laboratory to perform experiments and collect datasets. We then propose a novel semi-supervised DAE-MLP (Deep AutoEncoder-Multilayer Perceptron) that combines the advantages of supervised and unsupervised learning to detect anomalies in BSC systems. The experimental results demonstrate the effectiveness of our model for anomaly detection within BSCs, achieving a detection accuracy of 96.5%. Moreover, DAE-MLP can effectively detect new attacks by improving the F1-score up to 33.1% after updating the MLP component.
△ Less
Submitted 22 July, 2024;
originally announced July 2024.
-
Real-time Cyberattack Detection with Collaborative Learning for Blockchain Networks
Authors:
Tran Viet Khoa,
Do Hai Son,
Dinh Thai Hoang,
Nguyen Linh Trung,
Tran Thi Thuy Quynh,
Diep N. Nguyen,
Nguyen Viet Ha,
Eryk Dutkiewicz
Abstract:
With the ever-increasing popularity of blockchain applications, securing blockchain networks plays a critical role in these cyber systems. In this paper, we first study cyberattacks (e.g., flooding of transactions, brute pass) in blockchain networks and then propose an efficient collaborative cyberattack detection model to protect blockchain networks. Specifically, we deploy a blockchain network i…
▽ More
With the ever-increasing popularity of blockchain applications, securing blockchain networks plays a critical role in these cyber systems. In this paper, we first study cyberattacks (e.g., flooding of transactions, brute pass) in blockchain networks and then propose an efficient collaborative cyberattack detection model to protect blockchain networks. Specifically, we deploy a blockchain network in our laboratory to build a new dataset including both normal and attack traffic data. The main aim of this dataset is to generate actual attack data from different nodes in the blockchain network that can be used to train and test blockchain attack detection models. We then propose a real-time collaborative learning model that enables nodes in the network to share learning knowledge without disclosing their private data, thereby significantly enhancing system performance for the whole network. The extensive simulation and real-time experimental results show that our proposed detection model can detect attacks in the blockchain network with an accuracy of up to 97%.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
Droplets of Bosons at a Narrow Resonance
Authors:
Ke Wang,
Thimo Preis,
Dam Thanh Son
Abstract:
We consider bosons interacting through a narrow $s$-wave resonance. Such a resonance is characterized by an infinite scattering length and a large and negative effective range $r_0$. We argue that any number $N\ge3$ of bosons can form a self-bound cluster with the binding energy per particle increasing as $N^2$ for $1\ll N\ll (-r_0/a_\text{bg})^{1/2}$, where $a_\text{bg}$ is the background scatter…
▽ More
We consider bosons interacting through a narrow $s$-wave resonance. Such a resonance is characterized by an infinite scattering length and a large and negative effective range $r_0$. We argue that any number $N\ge3$ of bosons can form a self-bound cluster with the binding energy per particle increasing as $N^2$ for $1\ll N\ll (-r_0/a_\text{bg})^{1/2}$, where $a_\text{bg}$ is the background scattering length (between atoms and molecules). In the opposite limit $N\gg (-r_0/a_\text{bg})^{1/2}$, bosons form droplets with binding energy per particle saturating to a constant value independent of the particle number. The stability of clusters and droplets when the interaction is detuned from the resonance is also studied.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
On CR maps from the sphere into the tube over the future light cone II: Higher dimensions
Authors:
Michael Reiter,
Duong Ngoc Son
Abstract:
We determine all CR maps from the sphere in $\mathbb{C}^3$ into the tube over the future light cone in $\mathbb{C}^4$. This result leads to a complete characterization of proper holomorphic maps from the three-dimensional unit ball into the classical domain of type IV of four dimension and confirms a conjecture of Reiter - Son in [26] from 2022. Additionally, we prove a boundary characterization o…
▽ More
We determine all CR maps from the sphere in $\mathbb{C}^3$ into the tube over the future light cone in $\mathbb{C}^4$. This result leads to a complete characterization of proper holomorphic maps from the three-dimensional unit ball into the classical domain of type IV of four dimension and confirms a conjecture of Reiter - Son in [26] from 2022. Additionally, we prove a boundary characterization of isometric holomorphic embeddings from a ball into a classical domain of type IV in arbitrary dimensions that is similar to the main result in Huang - Lu - Tang - Xiao [16]. The result is then used to treat a special case in the general characterization.
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
W2E (Workout to Earn): A Low Cost DApp based on ERC-20 and ERC-721 standards
Authors:
Do Hai Son,
Nguyen Danh Hao,
Tran Thi Thuy Quynh,
Le Quang Minh
Abstract:
Decentralized applications (DApps) have gained prominence with the advent of blockchain technology, particularly Ethereum, providing trust, transparency, and traceability. However, challenges such as rising transaction costs and block confirmation delays hinder their widespread adoption. In this paper, we present our DApp named W2E - Workout to Earn, a mobile DApp incentivizing exercise through to…
▽ More
Decentralized applications (DApps) have gained prominence with the advent of blockchain technology, particularly Ethereum, providing trust, transparency, and traceability. However, challenges such as rising transaction costs and block confirmation delays hinder their widespread adoption. In this paper, we present our DApp named W2E - Workout to Earn, a mobile DApp incentivizing exercise through tokens and NFT awards. This application leverages the well-known ERC-20 and ERC-721 token standards of Ethereum. Additionally, we deploy W2E into various Ethereum-based networks, including Ethereum testnets, Layer 2 networks, and private networks, to survey gas efficiency and execution time. Our findings highlight the importance of network selection for DApp deployment, offering insights for developers and businesses seeking efficient blockchain solutions. This is because our experimental results are not only specific for W2E but also for other ERC-20 and ERC-721-based DApps.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
On a nonhomogeneous heat equation on the complex plane
Authors:
Duong Ngoc Son,
Tran Van Thuy,
Pham Truong Xuan
Abstract:
In this article, we investigate the existence, uniqueness, and asymptotic behaviors of mild solutions of a parabolic evolution equations on complex plane, in which the diffusion operator has the form \(\overline{\Box}_{\varphi} = \overline{D}\, \overline{D}^{\ast}\), where \(\overline{D} f = \bar{\partial}f + \varphi_{\bar{z}} f\), the function \(\varphi\) is smooth and subharmonic on \(\mathbb{C}…
▽ More
In this article, we investigate the existence, uniqueness, and asymptotic behaviors of mild solutions of a parabolic evolution equations on complex plane, in which the diffusion operator has the form \(\overline{\Box}_{\varphi} = \overline{D}\, \overline{D}^{\ast}\), where \(\overline{D} f = \bar{\partial}f + \varphi_{\bar{z}} f\), the function \(\varphi\) is smooth and subharmonic on \(\mathbb{C}\), and \(\overline{D}^{\ast}\) is the formal adjoint of \(\overline{D}\). Our method combines certain estimates of heat kernel associating with the homogeneous linear equation of Raich \cite{raich06} and a fixed point argument.
△ Less
Submitted 8 July, 2024; v1 submitted 10 June, 2024;
originally announced June 2024.
-
Relativistic Guiding-Center Motion: Action Principle, Kinetic Theory, and Hydrodynamics
Authors:
Dam Thanh Son,
Mikhail Stephanov
Abstract:
We treat the guiding-center dynamics in a varying external Maxwell field using a relativistically covariant action principle which reproduces the known Vandervoort expression for the drift velocity and extends it to curved spacetime. We derive the corresponding kinetic theory and ideal hydrodynamic theory. In contrast to conventional five-equation hydrodynamics, the guiding-center hydrodynamics ne…
▽ More
We treat the guiding-center dynamics in a varying external Maxwell field using a relativistically covariant action principle which reproduces the known Vandervoort expression for the drift velocity and extends it to curved spacetime. We derive the corresponding kinetic theory and ideal hydrodynamic theory. In contrast to conventional five-equation hydrodynamics, the guiding-center hydrodynamics needs only three equations due to a constraint on the motion across magnetic field. We argue that such a hydrodynamics is applicable to strongly coupled plasmas where kinetic theory fails.
△ Less
Submitted 2 October, 2024; v1 submitted 13 May, 2024;
originally announced May 2024.
-
An intuitive multi-frequency feature representation for SO(3)-equivariant networks
Authors:
Dongwon Son,
Jaehyung Kim,
Sanghyeon Son,
Beomjoon Kim
Abstract:
The usage of 3D vision algorithms, such as shape reconstruction, remains limited because they require inputs to be at a fixed canonical rotation. Recently, a simple equivariant network, Vector Neuron (VN) has been proposed that can be easily used with the state-of-the-art 3D neural network (NN) architectures. However, its performance is limited because it is designed to use only three-dimensional…
▽ More
The usage of 3D vision algorithms, such as shape reconstruction, remains limited because they require inputs to be at a fixed canonical rotation. Recently, a simple equivariant network, Vector Neuron (VN) has been proposed that can be easily used with the state-of-the-art 3D neural network (NN) architectures. However, its performance is limited because it is designed to use only three-dimensional features, which is insufficient to capture the details present in 3D data. In this paper, we introduce an equivariant feature representation for mapping a 3D point to a high-dimensional feature space. Our feature can discern multiple frequencies present in 3D data, which is the key to designing an expressive feature for 3D vision tasks. Our representation can be used as an input to VNs, and the results demonstrate that with our feature representation, VN captures more details, overcoming the limitation raised in its original paper.
△ Less
Submitted 15 March, 2024;
originally announced May 2024.
-
On CR maps between hyperquadrics and Winkelmann hypersurfaces
Authors:
Michael Reiter,
Duong Ngoc Son
Abstract:
In this paper, we study CR maps between hyperquadrics and Winkelmann hypersurfaces. Based on a previous study on the CR Ahlfors derivative of Lamel-Son and a recent result of Huang-Lu-Tang-Xiao on CR maps between hyperquadrics, we prove that a transversal CR map from a hyperquadric into a hyperquadric or a Winkelmann hypersurface extends to a local holomorphic isometric embedding with respect to c…
▽ More
In this paper, we study CR maps between hyperquadrics and Winkelmann hypersurfaces. Based on a previous study on the CR Ahlfors derivative of Lamel-Son and a recent result of Huang-Lu-Tang-Xiao on CR maps between hyperquadrics, we prove that a transversal CR map from a hyperquadric into a hyperquadric or a Winkelmann hypersurface extends to a local holomorphic isometric embedding with respect to certain Kähler metrics if and only if the Hermitian part of its CR Ahlfors derivative vanishes on an open set of the source. Our proof is based on relating the geometric rank of a CR map into a hyperquadric and its CR Ahlfors derivative.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
AV-Occupant Perceived Risk Model for Cut-In Scenarios with Empirical Evaluation
Authors:
Sarah Barendswaard,
Tong Duy Son
Abstract:
Advancements in autonomous vehicle (AV) technologies necessitate precise estimation of perceived risk to enhance user comfort, acceptance and trust. This paper introduces a novel AV-Occupant Risk (AVOR) model designed for perceived risk estimation during AV cut-in scenarios. An empirical study is conducted with 18 participants with realistic cut-in scenarios. Two factors were investigated: scenari…
▽ More
Advancements in autonomous vehicle (AV) technologies necessitate precise estimation of perceived risk to enhance user comfort, acceptance and trust. This paper introduces a novel AV-Occupant Risk (AVOR) model designed for perceived risk estimation during AV cut-in scenarios. An empirical study is conducted with 18 participants with realistic cut-in scenarios. Two factors were investigated: scenario risk and scene population. 76% of subjective risk responses indicate an increase in perceived risk at cut-in initiation. The existing perceived risk model did not capture this critical phenomenon. Our AVOR model demonstrated a significant improvement in estimating perceived risk during the early stages of cut-ins, especially for the high-risk scenario, enhancing modelling accuracy by up to 54%. The concept of the AVOR model can quantify perceived risk in other diverse driving contexts characterized by dynamic uncertainties, enhancing the reliability and human-centred focus of AV systems.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
Driving from Vision through Differentiable Optimal Control
Authors:
Flavia Sofia Acerbo,
Jan Swevers,
Tinne Tuytelaars,
Tong Duy Son
Abstract:
This paper proposes DriViDOC: a framework for Driving from Vision through Differentiable Optimal Control, and its application to learn autonomous driving controllers from human demonstrations. DriViDOC combines the automatic inference of relevant features from camera frames with the properties of nonlinear model predictive control (NMPC), such as constraint satisfaction. Our approach leverages the…
▽ More
This paper proposes DriViDOC: a framework for Driving from Vision through Differentiable Optimal Control, and its application to learn autonomous driving controllers from human demonstrations. DriViDOC combines the automatic inference of relevant features from camera frames with the properties of nonlinear model predictive control (NMPC), such as constraint satisfaction. Our approach leverages the differentiability of parametric NMPC, allowing for end-to-end learning of the driving model from images to control. The model is trained on an offline dataset comprising various human demonstrations collected on a motion-base driving simulator. During online testing, the model demonstrates successful imitation of different driving styles, and the interpreted NMPC parameters provide insights into the achievement of specific driving behaviors. Our experimental results show that DriViDOC outperforms other methods involving NMPC and neural networks, exhibiting an average improvement of 20% in imitation scores.
△ Less
Submitted 2 September, 2024; v1 submitted 22 March, 2024;
originally announced March 2024.
-
Uoc luong kenh truyen trong he thong da robot su dung SDR
Authors:
Do Hai Son,
Nguyen Huu Hung,
Pham Duy Hung,
Tran Thi Thuy Quynh
Abstract:
This study focuses on developing an experimental system for estimating communication channels in a multi-robot mobile system using software-defined radio (SDR) devices. The system consists of two mobile robots programmed for two scenarios: one where the robot remains stationary and another where it follows a predefined trajectory. Communication within the system is conducted through orthogonal fre…
▽ More
This study focuses on developing an experimental system for estimating communication channels in a multi-robot mobile system using software-defined radio (SDR) devices. The system consists of two mobile robots programmed for two scenarios: one where the robot remains stationary and another where it follows a predefined trajectory. Communication within the system is conducted through orthogonal frequency-division multiplexing (OFDM) to mitigate the effects of multipath propagation in indoor environments. The system's performance is evaluated using the bit error rate (BER). Connections related to robot motion and communication are implemented using Raspberry Pi 3 and BladeRF x115, respectively. The least squares (LS) technique is employed to estimate the channel with a bit error rate of approximately 10^(-2).
△ Less
Submitted 19 March, 2024;
originally announced March 2024.
-
RANDAO-based RNG: Last Revealer Attacks in Ethereum 2.0 Randomness and a Potential Solution
Authors:
Do Hai Son,
Tran Thi Thuy Quynh,
Le Quang Minh
Abstract:
Ethereum 2.0 is a major upgrade to improve its scalability, throughput, and security. In this version, RANDAO is the scheme to randomly select the users who propose, confirm blocks, and get rewards. However, a vulnerability, referred to as the `Last Revealer Attack' (LRA), compromises the randomness of this scheme by introducing bias to the Random Number Generator (RNG) process. This vulnerability…
▽ More
Ethereum 2.0 is a major upgrade to improve its scalability, throughput, and security. In this version, RANDAO is the scheme to randomly select the users who propose, confirm blocks, and get rewards. However, a vulnerability, referred to as the `Last Revealer Attack' (LRA), compromises the randomness of this scheme by introducing bias to the Random Number Generator (RNG) process. This vulnerability is first clarified again in this study. After that, we propose a Shamir's Secret Sharing (SSS)-based RANDAO scheme to mitigate the LRA. Through our analysis, the proposed method can prevent the LRA under favorable network conditions.
△ Less
Submitted 14 March, 2024;
originally announced March 2024.
-
Revisiting the dust torus size-luminosity relation based on a uniform reverberation mapping analysis
Authors:
Amit Kumar Mandal,
Jong-Hak Woo,
Shu Wang,
Suvendu Rakshit,
Hojin Cho,
Donghoon Son,
C. S. Stalin
Abstract:
We investigate the torus size -- luminosity relation of Type 1 AGNs based on the reverberation-mapping analysis using the light curves of the optical continuum and the IR continuum obtained with the W1 and W2-bands of the Wide-field Infrared Survey Explorer (WISE) survey. The final sample consists of 446 and 416 AGNs, respectively, for W1 and W2-band light curves, covering a large dynamic range of…
▽ More
We investigate the torus size -- luminosity relation of Type 1 AGNs based on the reverberation-mapping analysis using the light curves of the optical continuum and the IR continuum obtained with the W1 and W2-bands of the Wide-field Infrared Survey Explorer (WISE) survey. The final sample consists of 446 and 416 AGNs, respectively, for W1 and W2-band light curves, covering a large dynamic range of bolometric luminosity from $10^{43.4}$ to $10^{47.6}$ $erg \, s^{-1}$, which show reliable lag measurements based on our quality assessment analysis. After correcting for the accretion disk contamination in the observed IR flux, we constrain the torus size ($R_{dust}$) and AGN bolometric luminosity ($L_{bol}$) relationship with the best-fit slope of 0.39 (0.33) for the W1- (W2-) band, which is shallower than expected from the dust radiation equilibrium model. By combining the previous K-band lag measurements, we find that the measured torus size depends on the observed wavelength of the dust radiation, as $R_{dust,K}:R_{dust,W1}:R_{dust,W2}$ = 1.0:1.5:1.8 ($R_{dust} \, \propto \, λ^{0.80}$) at $L_{bol}$ = $10^{46} \, erg \, s^{-1}$, confirming a stratified structure of the torus, where wavelength-dependent emissions originate from distinct regions of the torus. By investigating the deviation from the best-fit torus size -- luminosity relation, we find a moderate correlation between the offset from the $R_{dust}$--$L_{bol}$ relation and Eddington ratio. This suggests a possible influence of the Eddington ratio on the observed flattening of the $R_{dust}$--$L_{bol}$ relationship.
△ Less
Submitted 19 April, 2024; v1 submitted 4 March, 2024;
originally announced March 2024.
-
Identifying changing-look AGNs using variability characteristics
Authors:
Shu Wang,
Jong-Hak Woo,
Elena Gallo,
Hengxiao Guo,
Donghoon Son,
Minzhi Kong,
Amit Kumar Mandal,
Hojin Cho,
Changseok Kim,
Jaejin Shin
Abstract:
Changing-look (CL) Active Galactic Nuclei (AGNs), characterized by appearance/disappearance of broad emission lines in the span of a few years, present a challenge for the AGN unified model, whereby the Type 1 vs. Type 2 dichotomy results from orientation effects alone. We present a systematic study of a large sample of spectroscopically classified AGNs, using optical variability data from the Zwi…
▽ More
Changing-look (CL) Active Galactic Nuclei (AGNs), characterized by appearance/disappearance of broad emission lines in the span of a few years, present a challenge for the AGN unified model, whereby the Type 1 vs. Type 2 dichotomy results from orientation effects alone. We present a systematic study of a large sample of spectroscopically classified AGNs, using optical variability data from the Zwicky Transient Facility (ZTF) as well as follow-up spectroscopy data. We demonstrate that Type 1 vs. 2 AGN can be neatly separated on the basis of the variability metric $σ_{\rm QSO}$, which quantifies the resemblance of a light curve to a damp random walk model. For a small sub-sample, however, the ZTF light curves are inconsistent with their previous classification, suggesting the occurrence of a CL event. Specifically, we identify 35 (12) turn-on (turn-off) CL AGN candidates at $z < 0.35$. Based on follow-up spectroscopy, we confirm 17 (4) turn-on (turn-off) CL AGNs out of 21 (5) candidates, presenting a high success rate of our method. Our results suggest that the occurrence rate of CL AGNs is $\sim$0.3% over timescales of 5 to 20 years, and confirm that the CL transition typically occurs at the Eddington ratio of $\leq 0.01$.
△ Less
Submitted 28 February, 2024;
originally announced February 2024.
-
Learning Based NMPC Adaptation for Autonomous Driving using Parallelized Digital Twin
Authors:
Jean Pierre Allamaa,
Panagiotis Patrinos,
Herman Van der Auweraer,
Tong Duy Son
Abstract:
In this work, we focus on the challenge of transferring an autonomous driving controller from simulation to the real world (i.e. Sim2Real). We propose a data-efficient method for online and on-the-fly adaptation of parametrizable control architectures such that the target closed-loop performance is optimized while accounting for uncertainties as model mismatches, changes in the environment, and ta…
▽ More
In this work, we focus on the challenge of transferring an autonomous driving controller from simulation to the real world (i.e. Sim2Real). We propose a data-efficient method for online and on-the-fly adaptation of parametrizable control architectures such that the target closed-loop performance is optimized while accounting for uncertainties as model mismatches, changes in the environment, and task variations. The novelty of the approach resides in leveraging black-box optimization enabled by Executable Digital Twins (xDTs) for data-driven parameter calibration through derivative-free methods to directly adapt the controller in real-time. The xDTs are augmented with Domain Randomization for robustness and allow for safe parameter exploration. The proposed method requires a minimal amount of interaction with the real-world as it pushes the exploration towards the xDTs. We validate our approach through real-world experiments, demonstrating its effectiveness in transferring and fine-tuning a NMPC with 9 parameters, in under 10 minutes. This eliminates the need for hours-long manual tuning and lengthy machine learning training and data collection phases. Our results show that the online adapted NMPC directly compensates for the Sim2Real gap and avoids overtuning in simulation. Importantly, a 75% improvement in tracking performance is achieved and the Sim2Real gap over the target performance is reduced from a factor of 876 to 1.033.
△ Less
Submitted 24 July, 2024; v1 submitted 26 February, 2024;
originally announced February 2024.
-
Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems
Authors:
Bui Duc Son,
Nguyen Tien Hoa,
Trinh Van Chien,
Waqas Khalid,
Mohamed Amine Ferrag,
Wan Choi,
Merouane Debbah
Abstract:
The Internet of Things (IoT) and massive IoT systems are key to sixth-generation (6G) networks due to dense connectivity, ultra-reliability, low latency, and high throughput. Artificial intelligence, including deep learning and machine learning, offers solutions for optimizing and deploying cutting-edge technologies for future radio communications. However, these techniques are vulnerable to adver…
▽ More
The Internet of Things (IoT) and massive IoT systems are key to sixth-generation (6G) networks due to dense connectivity, ultra-reliability, low latency, and high throughput. Artificial intelligence, including deep learning and machine learning, offers solutions for optimizing and deploying cutting-edge technologies for future radio communications. However, these techniques are vulnerable to adversarial attacks, leading to degraded performance and erroneous predictions, outcomes unacceptable for ubiquitous networks. This survey extensively addresses adversarial attacks and defense methods in 6G network-assisted IoT systems. The theoretical background and up-to-date research on adversarial attacks and defenses are discussed. Furthermore, we provide Monte Carlo simulations to validate the effectiveness of adversarial attacks compared to jamming attacks. Additionally, we examine the vulnerability of 6G IoT systems by demonstrating attack strategies applicable to key technologies, including reconfigurable intelligent surfaces, massive multiple-input multiple-output (MIMO)/cell-free massive MIMO, satellites, the metaverse, and semantic communications. Finally, we outline the challenges and future developments associated with adversarial attacks and defenses in 6G IoT systems.
△ Less
Submitted 28 January, 2024; v1 submitted 26 January, 2024;
originally announced January 2024.
-
Real-time MPC with Control Barrier Functions for Autonomous Driving using Safety Enhanced Collocation
Authors:
Jean Pierre Allamaa,
Panagiotis Patrinos,
Toshiyuki Ohtsuka,
Tong Duy Son
Abstract:
The autonomous driving industry is continuously dealing with safety-critical scenarios, and nonlinear model predictive control (NMPC) is a powerful control strategy for handling such situations. However, standard safety constraints are not scalable and require a long NMPC horizon. Moreover, the adoption of NMPC in the automotive industry is limited by the heavy computation of numerical optimizatio…
▽ More
The autonomous driving industry is continuously dealing with safety-critical scenarios, and nonlinear model predictive control (NMPC) is a powerful control strategy for handling such situations. However, standard safety constraints are not scalable and require a long NMPC horizon. Moreover, the adoption of NMPC in the automotive industry is limited by the heavy computation of numerical optimization routines. To address those issues, this paper presents a real-time capable NMPC for automated driving in urban environments, using control barrier functions (CBFs). Furthermore, the designed NMPC is based on a novel collocation transcription approach, named RESAFE/COL, that allows to reduce the number of optimization variables while still guaranteeing the continuous time (nonlinear) inequality constraints satisfaction, through regional convex hull approximation. RESAFE/COL is proven to be 5 times faster than multiple shooting and more tractable for embedded hardware without a decrease in the performance, nor accuracy and safety of the numerical solution. We validate our NMPC-CBF with RESAFE/COL on digital twins of the vehicle and the urban environment and show the safe controller's ability to improve crash avoidance by 91\%. Supplementary visual material can be found at https://youtu.be/_EnbfYwljp4.
△ Less
Submitted 11 July, 2024; v1 submitted 12 January, 2024;
originally announced January 2024.
-
The Seoul National University AGN Monitoring Project III: H$β$ lag measurements of 32 luminous AGNs and the high-luminosity end of the size--luminosity relation
Authors:
Jong-Hak Woo,
Shu Wang,
Suvendu Rakshit,
Hojin Cho,
Donghoon Son,
Vardha N. Bennert,
Elena Gallo,
Edmund Hodges-Kluck,
Tommaso Treu,
Aaron J. Barth,
Wanjin Cho,
Adi Foord,
Jaehyuk Geum,
Hengxiao Guo,
Yashashree Jadhav,
Yiseul Jeon,
Kyle M. Kabasares,
Won-Suk Kang,
Changseok Kim,
Minjin Kim,
Tae-Woo Kim,
Huynh Anh N. Le,
Matthew A. Malkan,
Amit Kumar Mandal,
Daeseong Park
, et al. (6 additional authors not shown)
Abstract:
We present the main results from a long-term reverberation mapping campaign carried out for the Seoul National University Active Galactic Nuclei (AGN) Monitoring Project. High-quality data were obtained during 2015-2021 for 32 luminous AGNs (i.e., continuum luminosity in the range of $10^{44-46}$ erg s$^{-1}$) at a regular cadence, of 20-30 days for spectroscopy and 3-5 days for photometry. We obt…
▽ More
We present the main results from a long-term reverberation mapping campaign carried out for the Seoul National University Active Galactic Nuclei (AGN) Monitoring Project. High-quality data were obtained during 2015-2021 for 32 luminous AGNs (i.e., continuum luminosity in the range of $10^{44-46}$ erg s$^{-1}$) at a regular cadence, of 20-30 days for spectroscopy and 3-5 days for photometry. We obtain time lag measurements between the variability in the H$β$ emission and the continuum for 32 AGNs; twenty-five of those have the best lag measurements based on our quality assessment, examining correlation strength, and the posterior lag distribution. Our study significantly increases the current sample of reverberation-mapped AGNs, particularly at the moderate to high luminosity end. Combining our results with literature measurements, we derive a H$β$ broad line region size--luminosity relation with a shallower slope than reported in the literature. For a given luminosity, most of our measured lags are shorter than the expectation, implying that single-epoch black hole mass estimators based on previous calibrations could suffer large systematic uncertainties.
△ Less
Submitted 26 November, 2023;
originally announced November 2023.
-
On the Semi-Blind Mutually Referenced Equalizers for MIMO Systems
Authors:
Do Hai Son,
Karim Abed-Meraim,
Tran Trong Duy,
Nguyen Linh Trung,
Tran Thi Thuy Quynh
Abstract:
Minimizing training overhead in channel estimation is a crucial challenge in wireless communication systems. This paper presents an extension of the traditional blind algorithm, called "Mutually referenced equalizers" (MRE), specifically designed for MIMO systems. Additionally, we propose a novel semi-blind method, SB-MRE, which combines the benefits of pilot-based and MRE approaches to achieve en…
▽ More
Minimizing training overhead in channel estimation is a crucial challenge in wireless communication systems. This paper presents an extension of the traditional blind algorithm, called "Mutually referenced equalizers" (MRE), specifically designed for MIMO systems. Additionally, we propose a novel semi-blind method, SB-MRE, which combines the benefits of pilot-based and MRE approaches to achieve enhanced performance while utilizing a reduced number of pilot symbols. Moreover, the SB-MRE algorithm helps to minimize complexity and training overhead and to remove the ambiguities inherent to blind processing. The simulation results demonstrated that SB-MRE outperforms other linear algorithms, i.e., MMSE, ZF, and MRE, in terms of training overhead symbols and complexity, thereby offering a promising solution to address the challenge of minimizing training overhead in channel estimation for wireless communication systems.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
Unraveling the Complex Structure of AGN-driven Outflows. VI. Strong Ionized Outflows in Type 1 AGNs and the Outflow Size-Luminosity Relation
Authors:
Changseok Kim,
Jong-Hak Woo,
Rongxin Luo,
Aeree Chung,
Junhyun Baek,
Huynh Anh N. Le,
Donghoon Son
Abstract:
We present spatially resolved gas kinematics, ionization, and energetics of 11 type 1 and 5 type 2 active galactic nuclei (AGNs) with strong ionized gas outflows at z $<0.3$ using Gemini Multi-Object Spectrograph Integral Field Unit (GMOS-IFU) data. We find a strongly blueshifted region in [OIII] velocity maps, representing an approaching cone in biconical outflows, and blueshifted and redshifted…
▽ More
We present spatially resolved gas kinematics, ionization, and energetics of 11 type 1 and 5 type 2 active galactic nuclei (AGNs) with strong ionized gas outflows at z $<0.3$ using Gemini Multi-Object Spectrograph Integral Field Unit (GMOS-IFU) data. We find a strongly blueshifted region in [OIII] velocity maps, representing an approaching cone in biconical outflows, and blueshifted and redshifted regions in H$α$ velocity maps, which show gravitationally rotating kinematics. AGN photoionization is dominant in the central region of most targets, and some of them also show ring-like structures of LINER or composite that surround the AGN-dominated center. Following our previous studies, we kinematically determine outflow sizes by the ratio between [OIII] and stellar velocity dispersion. Outflow sizes of type 1 AGNs follow the same kinematic outflow size-[OIII] luminosity relation obtained from the type 2 IFU sample in Kang & Woo and Luo (updated slope $0.29\pm0.04$), while they are limited to the central kpc scales, indicating the lack of global impact of outflows on the interstellar medium. Small mass outflow rates and large star formation rates of the combined sample support that there is no evidence of rapid star formation quenching by outflows, which is consistent with the delayed AGN feedback.
△ Less
Submitted 12 October, 2023; v1 submitted 10 October, 2023;
originally announced October 2023.
-
Applied nonrelativistic conformal field theory: scattering-length and effective-range corrections to unnuclear physics
Authors:
Subham Dutta Chowdhury,
Ruchira Mishra,
Dam Thanh Son
Abstract:
Due to an accidentally large $s$-wave scattering length, in a relatively wide range of energy, neutrons are approximately described by the nonrelativistic conformal field theory of unitarity fermions, perturbed by one relevant and an infinite number of irrelevant operators. We develop a formalism which provides a nonperturbative definition of local operators in that nonrelativistic conformal field…
▽ More
Due to an accidentally large $s$-wave scattering length, in a relatively wide range of energy, neutrons are approximately described by the nonrelativistic conformal field theory of unitarity fermions, perturbed by one relevant and an infinite number of irrelevant operators. We develop a formalism which provides a nonperturbative definition of local operators in that nonrelativistic conformal field theory. We compute the scattering-length and effective-range corrections to the two-point functions of primary charge-three operators using the technique of conformal perturbation theory. These calculations allow us to find the first corrections to the scale-invariant behavior of the rate of nuclear reactions with three neutrons in the final state in the regime when the neutrons have small relative momenta.
△ Less
Submitted 26 September, 2023;
originally announced September 2023.
-
XFedHunter: An Explainable Federated Learning Framework for Advanced Persistent Threat Detection in SDN
Authors:
Huynh Thai Thi,
Ngo Duc Hoang Son,
Phan The Duy,
Nghi Hoang Khoa,
Khoa Ngo-Khanh,
Van-Hau Pham
Abstract:
Advanced Persistent Threat (APT) attacks are highly sophisticated and employ a multitude of advanced methods and techniques to target organizations and steal sensitive and confidential information. APT attacks consist of multiple stages and have a defined strategy, utilizing new and innovative techniques and technologies developed by hackers to evade security software monitoring. To effectively pr…
▽ More
Advanced Persistent Threat (APT) attacks are highly sophisticated and employ a multitude of advanced methods and techniques to target organizations and steal sensitive and confidential information. APT attacks consist of multiple stages and have a defined strategy, utilizing new and innovative techniques and technologies developed by hackers to evade security software monitoring. To effectively protect against APTs, detecting and predicting APT indicators with an explanation from Machine Learning (ML) prediction is crucial to reveal the characteristics of attackers lurking in the network system. Meanwhile, Federated Learning (FL) has emerged as a promising approach for building intelligent applications without compromising privacy. This is particularly important in cybersecurity, where sensitive data and high-quality labeling play a critical role in constructing effective machine learning models for detecting cyber threats. Therefore, this work proposes XFedHunter, an explainable federated learning framework for APT detection in Software-Defined Networking (SDN) leveraging local cyber threat knowledge from many training collaborators. In XFedHunter, Graph Neural Network (GNN) and Deep Learning model are utilized to reveal the malicious events effectively in the large number of normal ones in the network system. The experimental results on NF-ToN-IoT and DARPA TCE3 datasets indicate that our framework can enhance the trust and accountability of ML-based systems utilized for cybersecurity purposes without privacy leakage.
△ Less
Submitted 15 September, 2023;
originally announced September 2023.
-
Nonlinear Lifshitz Photon Theory in Condensed Matter Systems
Authors:
Yi-Hsien Du,
Cenke Xu,
Dam Thanh Son
Abstract:
We present an interacting theory of a $U(1)$ gauge boson with a quadratic dispersion relation, which we call the "nonlinear Lifshitz photon theory.'' The Lifshitz photon is a three-dimensional generalization of the Tkachenko mode in rotating superfluids. Starting from the Wigner crystal of charged particles coupled to a dynamical $U(1)$ gauge field, after integrating out gapped degrees of freedom,…
▽ More
We present an interacting theory of a $U(1)$ gauge boson with a quadratic dispersion relation, which we call the "nonlinear Lifshitz photon theory.'' The Lifshitz photon is a three-dimensional generalization of the Tkachenko mode in rotating superfluids. Starting from the Wigner crystal of charged particles coupled to a dynamical $U(1)$ gauge field, after integrating out gapped degrees of freedom, we arrive at the Lagrangian for the nonlinear Lifshitz photon. The symmetries of the theory include a global $U(1)$ 1-form symmetry and nonlinearly realized "magnetic" translation and rotation symmetries. The interaction terms in the theory lead to the decay of the Lifshitz photon, the rate of which we estimate. We show that the Wilson loop, which plays the role of the order parameter of the spontaneous breaking of the 1-form global symmetry, deviates from the perimeter law by an additional logarithmic factor. We explore potential connections to other condensed matter systems, with a particular focus on quantum spin ice and ferromagnets. Finally, we generalize our theory to higher dimensions.
△ Less
Submitted 7 September, 2023;
originally announced September 2023.
-
Collaborative Learning Framework to Detect Attacks in Transactions and Smart Contracts
Authors:
Tran Viet Khoa,
Do Hai Son,
Chi-Hieu Nguyen,
Dinh Thai Hoang,
Diep N. Nguyen,
Tran Thi Thuy Quynh,
Trong-Minh Hoang,
Nguyen Viet Ha,
Eryk Dutkiewicz,
Abu Alsheikh,
Nguyen Linh Trung
Abstract:
With the escalating prevalence of malicious activities exploiting vulnerabilities in blockchain systems, there is an urgent requirement for robust attack detection mechanisms. To address this challenge, this paper presents a novel collaborative learning framework designed to detect attacks in blockchain transactions and smart contracts by analyzing transaction features. Our framework exhibits the…
▽ More
With the escalating prevalence of malicious activities exploiting vulnerabilities in blockchain systems, there is an urgent requirement for robust attack detection mechanisms. To address this challenge, this paper presents a novel collaborative learning framework designed to detect attacks in blockchain transactions and smart contracts by analyzing transaction features. Our framework exhibits the capability to classify various types of blockchain attacks, including intricate attacks at the machine code level (e.g., injecting malicious codes to withdraw coins from users unlawfully), which typically necessitate significant time and security expertise to detect. To achieve that, the proposed framework incorporates a unique tool that transforms transaction features into visual representations, facilitating efficient analysis and classification of low-level machine codes. Furthermore, we propose an advanced collaborative learning model to enable real-time detection of diverse attack types at distributed mining nodes. Our model can efficiently detect attacks in smart contracts and transactions for blockchain systems without the need to gather all data from mining nodes into a centralized server. In order to evaluate the performance of our proposed framework, we deploy a pilot system based on a private Ethereum network and conduct multiple attack scenarios to generate a novel dataset. To the best of our knowledge, our dataset is the most comprehensive and diverse collection of transactions and smart contracts synthesized in a laboratory for cyberattack detection in blockchain systems. Our framework achieves a detection accuracy of approximately 94% through extensive simulations and 91% in real-time experiments with a throughput of over 2,150 transactions per second.
△ Less
Submitted 10 August, 2024; v1 submitted 30 August, 2023;
originally announced August 2023.
-
Photometric Selection of Unobscured QSOs in the Ecliptic Poles: KMTNet in the South Field and Pan-STARRS in the North Field
Authors:
Woowon Byun,
Minjin Kim,
Yun-Kyeong Sheen,
Dongseob Lee,
Luis C. Ho,
Jongwan Ko,
Kwang-Il Seon,
Hyunjin Shim,
Dohyeong Kim,
Yongjung Kim,
Joon Hyeop Lee,
Hyunjin Jeong,
Jong-Hak Woo,
Woong-Seob Jeong,
Byeong-Gon Park,
Sang Chul Kim,
Yongseok Lee,
Sang-Mok Cha,
Hyunmi Song,
Donghoon Son,
Yujin Yang
Abstract:
We search for quasi-stellar objects (QSOs) in a wide area of the south ecliptic pole (SEP) field, which has been and will continue to be intensively explored through various space missions. For this purpose, we obtain deep broadband optical images of the SEP field covering an area of $\sim$$14.5\times14.5$ deg$^2$ with the Korea Microlensing Telescope Network. The 5$σ$ detection limits for point s…
▽ More
We search for quasi-stellar objects (QSOs) in a wide area of the south ecliptic pole (SEP) field, which has been and will continue to be intensively explored through various space missions. For this purpose, we obtain deep broadband optical images of the SEP field covering an area of $\sim$$14.5\times14.5$ deg$^2$ with the Korea Microlensing Telescope Network. The 5$σ$ detection limits for point sources in the $BVRI$ bands are estimated to be $\sim$22.59, 22.60, 22.98, and 21.85 mag, respectively. Utilizing data from Wide-field Infrared Survey Explorer, unobscured QSO candidates are selected among the optically point-like sources using the mid-infrared (MIR) and optical-MIR colors. To further refine our selection and eliminate any contamination not adequately removed by the color-based selection, we perform the spectral energy distribution fitting with archival photometric data ranging from optical to MIR. As a result, we identify a total of 2,383 unobscured QSO candidates in the SEP field. We also apply a similar method to the north ecliptic pole field using the Pan-STARRS data and obtain a similar result of identifying 2,427 candidates. The differential number count per area of our QSO candidates is in good agreement with those measured from spectroscopically confirmed ones in other fields. Finally, we compare the results with the literature and discuss how this work will be implicated in future studies, especially with the upcoming space missions.
△ Less
Submitted 28 July, 2023;
originally announced July 2023.
-
The Seoul National University AGN Monitoring Project IV: H$α$ reverberation mapping of 6 AGNs and the H$α$ Size-Luminosity Relation
Authors:
Hojin Cho,
Jong-Hak Woo,
Shu Wang,
Donghoon Son,
Jaejin Shin,
Suvendu Rakshit,
Aaron J. Barth,
Vardha N. Bennert,
Elena Gallo,
Edmund Hodges-Kluck,
Tommaso Treu,
Hyun-Jin Bae,
Wanjin Cho,
Adi Foord,
Jaehyuk Geum,
Yashashree Jadhav,
Yiseul Jeon,
Kyle M. Kabasares,
Daeun Kang,
Wonseok Kang,
Changseok Kim,
Donghwa Kim,
Minjin Kim,
Taewoo Kim,
Huynh Anh N. Le
, et al. (7 additional authors not shown)
Abstract:
The broad line region (BLR) size-luminosity relation has paramount importance for estimating the mass of black holes in active galactic nuclei (AGNs). Traditionally, the size of the H$β$ BLR is often estimated from the optical continuum luminosity at 5100\angstrom{} , while the size of the H$α$ BLR and its correlation with the luminosity is much less constrained. As a part of the Seoul National Un…
▽ More
The broad line region (BLR) size-luminosity relation has paramount importance for estimating the mass of black holes in active galactic nuclei (AGNs). Traditionally, the size of the H$β$ BLR is often estimated from the optical continuum luminosity at 5100\angstrom{} , while the size of the H$α$ BLR and its correlation with the luminosity is much less constrained. As a part of the Seoul National University AGN Monitoring Project (SAMP) which provides six-year photometric and spectroscopic monitoring data, we present our measurements of the H$α$ lags of 6 high-luminosity AGNs. Combined with the measurements for 42 AGNs from the literature, we derive the size-luminosity relations of H$α$ BLR against broad H$α$ and 5100\angstrom{} continuum luminosities. We find the slope of the relations to be $0.61\pm0.04$ and $0.59\pm0.04$, respectively, which are consistent with the \hb{} size-luminosity relation. Moreover, we find a linear relation between the 5100\angstrom{} continuum luminosity and the broad H$α$ luminosity across 7 orders of magnitude. Using these results, we propose a new virial mass estimator based on the H$α$ broad emission line, finding that the previous mass estimates based on the scaling relations in the literature are overestimated by up to 0.7 dex at masses lower than $10^7$~M$_{\odot}$.
△ Less
Submitted 29 June, 2023;
originally announced June 2023.
-
Investigating the Correlation of Outflow Kinematics with Radio Activity. Gas Outflows in AGNs. VII
Authors:
Ashraf Ayubinia,
Jong-Hak Woo,
Suvendu Rakshit,
Donghoon Son
Abstract:
We explore the relationship between the ionized gas outflows and radio activity using a sample of $\sim$ 6000 AGNs at z < 0.4 with the kinematical measurement based on the [O III] line profile and the radio detection in the VLA FIRST Survey. To quantify radio activity, we divide our sample into a series of binary subclasses based on the radio properties, i.e., radio-luminous/radio-weak, AGN-domina…
▽ More
We explore the relationship between the ionized gas outflows and radio activity using a sample of $\sim$ 6000 AGNs at z < 0.4 with the kinematical measurement based on the [O III] line profile and the radio detection in the VLA FIRST Survey. To quantify radio activity, we divide our sample into a series of binary subclasses based on the radio properties, i.e., radio-luminous/radio-weak, AGN-dominated/star-formation-contaminated, compact/extended, and radio-loud/radio-quiet. None of the binary subclasses exhibits a significant difference in the normalized [O III] velocity dispersion at a given [O III] luminosity once we correct for the influence of the host galaxy gravitational potential. We only detect a significant difference of [O III] kinematics between high and low radio-Eddington ratio (L$_{1.4 GHz}$/L$_{Edd}$) AGNs. In contrast, we find a remarkable difference in ionized gas kinematics between high and low bolometric-Eddington ratio AGNs. These results suggest that accretion rate is the primary mechanism in driving ionized gas outflows, while radio activity may play a secondary role providing additional influence on gas kinematics
△ Less
Submitted 22 June, 2023;
originally announced June 2023.
-
Impact Analysis of Antenna Array Geometry on Performance of Semi-blind Structured Channel Estimation for massive MIMO-OFDM systems
Authors:
Do Hai Son,
Tran Thi Thuy Quynh
Abstract:
Channel estimation is always implemented in communication systems to overcome the effect of interference and noise. Especially, in wireless communications, this task is more challenging to improve system performance while saving resources. This paper focuses on investigating the impact of geometries of antenna arrays on the performance of structured channel estimation in massive MIMO-OFDM systems.…
▽ More
Channel estimation is always implemented in communication systems to overcome the effect of interference and noise. Especially, in wireless communications, this task is more challenging to improve system performance while saving resources. This paper focuses on investigating the impact of geometries of antenna arrays on the performance of structured channel estimation in massive MIMO-OFDM systems. We use Cram'er Rao Bound to analyze errors in two methods, i.e., training-based and semi-blind-based channel estimations. The simulation results show that the latter gets significantly better performance than the former. Besides, the system with Uniform Cylindrical Array outperforms the traditional Uniform Linear Array one in both estimation methods.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
Local object crop collision network for efficient simulation of non-convex objects in GPU-based simulators
Authors:
Dongwon Son,
Beomjoon Kim
Abstract:
Our goal is to develop an efficient contact detection algorithm for large-scale GPU-based simulation of non-convex objects. Current GPU-based simulators such as IsaacGym and Brax must trade-off speed with fidelity, generality, or both when simulating non-convex objects. Their main issue lies in contact detection (CD): existing CD algorithms, such as Gilbert-Johnson-Keerthi (GJK), must trade off th…
▽ More
Our goal is to develop an efficient contact detection algorithm for large-scale GPU-based simulation of non-convex objects. Current GPU-based simulators such as IsaacGym and Brax must trade-off speed with fidelity, generality, or both when simulating non-convex objects. Their main issue lies in contact detection (CD): existing CD algorithms, such as Gilbert-Johnson-Keerthi (GJK), must trade off their computational speed with accuracy which becomes expensive as the number of collisions among non-convex objects increases. We propose a data-driven approach for CD, whose accuracy depends only on the quality and quantity of offline dataset rather than online computation time. Unlike GJK, our method inherently has a uniform computational flow, which facilitates efficient GPU usage based on advanced compilers such as XLA (Accelerated Linear Algebra). Further, we offer a data-efficient solution by learning the patterns of colliding local crop object shapes, rather than global object shapes which are harder to learn. We demonstrate our approach improves the efficiency of existing CD methods by a factor of 5-10 for non-convex objects with comparable accuracy. Using the previous work on contact resolution for a neural-network-based contact detector, we integrate our CD algorithm into the open-source GPU-based simulator, Brax, and show that we can improve the efficiency over IsaacGym and generality over standard Brax. We highly recommend the videos of our simulator included in the supplementary materials.
△ Less
Submitted 10 June, 2023; v1 submitted 19 April, 2023;
originally announced April 2023.
-
Testing the Channels of Convolutional Neural Networks
Authors:
Kang Choi,
Donghyun Son,
Younghoon Kim,
Jiwon Seo
Abstract:
Neural networks have complex structures, and thus it is hard to understand their inner workings and ensure correctness. To understand and debug convolutional neural networks (CNNs) we propose techniques for testing the channels of CNNs. We design FtGAN, an extension to GAN, that can generate test data with varying the intensity (i.e., sum of the neurons) of a channel of a target CNN. We also propo…
▽ More
Neural networks have complex structures, and thus it is hard to understand their inner workings and ensure correctness. To understand and debug convolutional neural networks (CNNs) we propose techniques for testing the channels of CNNs. We design FtGAN, an extension to GAN, that can generate test data with varying the intensity (i.e., sum of the neurons) of a channel of a target CNN. We also proposed a channel selection algorithm to find representative channels for testing. To efficiently inspect the target CNN's inference computations, we define unexpectedness score, which estimates how similar the inference computation of the test data is to that of the training data. We evaluated FtGAN with five public datasets and showed that our techniques successfully identify defective channels in five different CNN models.
△ Less
Submitted 6 March, 2023;
originally announced March 2023.
-
Gradient Estimation for Unseen Domain Risk Minimization with Pre-Trained Models
Authors:
Byounggyu Lew,
Donghyun Son,
Buru Chang
Abstract:
Domain generalization aims to build generalized models that perform well on unseen domains when only source domains are available for model optimization. Recent studies have shown that large-scale pre-trained models can enhance domain generalization by leveraging their generalization power. However, these pre-trained models lack target task-specific knowledge yet due to discrepancies between the p…
▽ More
Domain generalization aims to build generalized models that perform well on unseen domains when only source domains are available for model optimization. Recent studies have shown that large-scale pre-trained models can enhance domain generalization by leveraging their generalization power. However, these pre-trained models lack target task-specific knowledge yet due to discrepancies between the pre-training objectives and the target task. Although the task-specific knowledge could be learned from source domains by fine-tuning, this hurts the generalization power of pre-trained models due to gradient bias toward the source domains. To alleviate this problem, we propose a new domain generalization method that estimates unobservable gradients that reduce potential risks in unseen domains using a large-scale pre-trained model. These estimated unobservable gradients allow the pre-trained model to learn task-specific knowledge further while preserving its generalization ability by relieving the gradient bias. Our experimental results show that our method outperforms baseline methods on DomainBed, a standard benchmark in domain generalization. We also provide extensive analyses to demonstrate that the pre-trained model can learn task-specific knowledge without sacrificing its generalization power.
△ Less
Submitted 9 September, 2023; v1 submitted 2 February, 2023;
originally announced February 2023.
-
BOMP-NAS: Bayesian Optimization Mixed Precision NAS
Authors:
David van Son,
Floran de Putter,
Sebastian Vogel,
Henk Corporaal
Abstract:
Bayesian Optimization Mixed-Precision Neural Architecture Search (BOMP-NAS) is an approach to quantization-aware neural architecture search (QA-NAS) that leverages both Bayesian optimization (BO) and mixed-precision quantization (MP) to efficiently search for compact, high performance deep neural networks. The results show that integrating quantization-aware fine-tuning (QAFT) into the NAS loop is…
▽ More
Bayesian Optimization Mixed-Precision Neural Architecture Search (BOMP-NAS) is an approach to quantization-aware neural architecture search (QA-NAS) that leverages both Bayesian optimization (BO) and mixed-precision quantization (MP) to efficiently search for compact, high performance deep neural networks. The results show that integrating quantization-aware fine-tuning (QAFT) into the NAS loop is a necessary step to find networks that perform well under low-precision quantization: integrating it allows a model size reduction of nearly 50\% on the CIFAR-10 dataset. BOMP-NAS is able to find neural networks that achieve state of the art performance at much lower design costs. This study shows that BOMP-NAS can find these neural networks at a 6x shorter search time compared to the closest related work.
△ Less
Submitted 27 January, 2023;
originally announced January 2023.
-
Noncommutative Field Theory of the Tkachenko Mode: Symmetries and Decay Rate
Authors:
Yi-Hsien Du,
Sergej Moroz,
Dung Xuan Nguyen,
Dam Thanh Son
Abstract:
We construct an effective field theory describing the collective Tkachenko oscillation mode of a vortex lattice in a two-dimensional rotating Bose-Einstein condensate in the long-wavelength regime. The theory has the form of a noncommutative field theory of a Nambu-Goldstone boson, which exhibits a noncommutative version of dipole symmetry. From the effective field theory, we show that, at zero te…
▽ More
We construct an effective field theory describing the collective Tkachenko oscillation mode of a vortex lattice in a two-dimensional rotating Bose-Einstein condensate in the long-wavelength regime. The theory has the form of a noncommutative field theory of a Nambu-Goldstone boson, which exhibits a noncommutative version of dipole symmetry. From the effective field theory, we show that, at zero temperature, the decay width $Γ$ of the Tkachenko mode scales with its energy $E$ as $Γ\sim E^3$ in the low-energy limit. We also discuss the width of the Tkachenko mode at a small temperature.
△ Less
Submitted 14 February, 2024; v1 submitted 16 December, 2022;
originally announced December 2022.
-
Reinforcement Learning from Simulation to Real World Autonomous Driving using Digital Twin
Authors:
Kevin Voogd,
Jean Pierre Allamaa,
Javier Alonso-Mora,
Tong Duy Son
Abstract:
Reinforcement learning (RL) is a promising solution for autonomous vehicles to deal with complex and uncertain traffic environments. The RL training process is however expensive, unsafe, and time consuming. Algorithms are often developed first in simulation and then transferred to the real world, leading to a common sim2real challenge that performance decreases when the domain changes. In this pap…
▽ More
Reinforcement learning (RL) is a promising solution for autonomous vehicles to deal with complex and uncertain traffic environments. The RL training process is however expensive, unsafe, and time consuming. Algorithms are often developed first in simulation and then transferred to the real world, leading to a common sim2real challenge that performance decreases when the domain changes. In this paper, we propose a transfer learning process to minimize the gap by exploiting digital twin technology, relying on a systematic and simultaneous combination of virtual and real world data coming from vehicle dynamics and traffic scenarios. The model and testing environment are evolved from model, hardware to vehicle in the loop and proving ground testing stages, similar to standard development cycle in automotive industry. In particular, we also integrate other transfer learning techniques such as domain randomization and adaptation in each stage. The simulation and real data are gradually incorporated to accelerate and make the transfer learning process more robust. The proposed RL methodology is applied to develop a path following steering controller for an autonomous electric vehicle. After learning and deploying the real-time RL control policy on the vehicle, we obtained satisfactory and safe control performance already from the first deployment, demonstrating the advantages of the proposed digital twin based learning process.
△ Less
Submitted 27 November, 2022;
originally announced November 2022.
-
Safety Envelope for Orthogonal Collocation Methods in Embedded Optimal Control
Authors:
Jean Pierre Allamaa,
Panagiotis Patrinos,
Herman Van der Auweraer,
Tong Duy Son
Abstract:
Orthogonal collocation methods are direct approaches for solving optimal control problems (OCP). A high solution accuracy is achieved with few optimization variables, making it more favorable for embedded and real-time NMPC applications. However, collocation approaches lack a guarantee about the safety of the resulting trajectory as inequality constraints are only set on a finite number of colloca…
▽ More
Orthogonal collocation methods are direct approaches for solving optimal control problems (OCP). A high solution accuracy is achieved with few optimization variables, making it more favorable for embedded and real-time NMPC applications. However, collocation approaches lack a guarantee about the safety of the resulting trajectory as inequality constraints are only set on a finite number of collocation points. In this paper we propose a method to efficiently create a convex safety envelope containing the trajectory such that the solution fully satisfies the OCP constraints. We make use of Bernstein approximations of a polynomial's extrema and span the solution over an orthogonal basis using Legendre polynomials. The tightness of the safety envelope estimation, high accuracy in solving the underlying differential equations, fast rate of convergence and little conservatism are properties of the presented approach making it a suitable method for safe real-time NMPC deployment. We show that our method has comparable computational performance to pseudospectral approaches and can accurately approximate the original OCP up to 9 times more quickly than standard multiple-shooting method in autonomous driving applications, without adding complexity to the formulation.
△ Less
Submitted 9 July, 2023; v1 submitted 27 November, 2022;
originally announced November 2022.
-
Evaluation of MPC-based Imitation Learning for Human-like Autonomous Driving
Authors:
Flavia Sofia Acerbo,
Jan Swevers,
Tinne Tuytelaars,
Tong Duy Son
Abstract:
This work evaluates and analyzes the combination of imitation learning (IL) and differentiable model predictive control (MPC) for the application of human-like autonomous driving. We combine MPC with a hierarchical learning-based policy, and measure its performance in open-loop and closed-loop with metrics related to safety, comfort and similarity to human driving characteristics. We also demonstr…
▽ More
This work evaluates and analyzes the combination of imitation learning (IL) and differentiable model predictive control (MPC) for the application of human-like autonomous driving. We combine MPC with a hierarchical learning-based policy, and measure its performance in open-loop and closed-loop with metrics related to safety, comfort and similarity to human driving characteristics. We also demonstrate the value of augmenting open-loop behavioral cloning with closed-loop training for a more robust learning, approximating the policy gradient through time with the state space model used by the MPC. We perform experimental evaluations on a lane keeping control system, learned from demonstrations collected on a fixed-base driving simulator, and show that our imitative policies approach the human driving style preferences.
△ Less
Submitted 26 June, 2023; v1 submitted 22 November, 2022;
originally announced November 2022.
-
On highly degenerate CR maps of spheres
Authors:
Giuseppe della Sala,
Bernhard Lamel,
Michael Reiter,
Duong Ngoc Son
Abstract:
For $N \geq 4$ we classify the $(N-3)$-degenerate smooth CR maps of the three-dimensional unit sphere into the $(2N-1)$-dimensional unit sphere. Each of these maps has image being contained in a five-dimensional complex-linear space and is of degree at most two, or equivalent to one of the four maps into the five-dimensional sphere classified by Faran. As a byproduct of our classification we obtai…
▽ More
For $N \geq 4$ we classify the $(N-3)$-degenerate smooth CR maps of the three-dimensional unit sphere into the $(2N-1)$-dimensional unit sphere. Each of these maps has image being contained in a five-dimensional complex-linear space and is of degree at most two, or equivalent to one of the four maps into the five-dimensional sphere classified by Faran. As a byproduct of our classification we obtain new examples of rational maps of degree three which are $(N-3)$-degenerate only along a proper real subvariety and are not equivalent to polynomial maps. In particular, by changing the base point, it is possible to construct new families of nondegenerate maps.
△ Less
Submitted 24 October, 2022;
originally announced October 2022.
-
Snowmass Theory Frontier: Effective Field Theory
Authors:
Matthew Baumgart,
Fady Bishara,
Tomas Brauner,
Joachim Brod,
Giovanni Cabass,
Timothy Cohen,
Nathaniel Craig,
Claudia de Rham,
Patrick Draper,
A. Liam Fitzpatrick,
Martin Gorbahn,
Sean Hartnoll,
Mikhail Ivanov,
Pavel Kovtun,
Sandipan Kundu,
Matthew Lewandowski,
Hong Liu,
Xiaochuan Lu,
Mark Mezei,
Mehrdad Mirbabayi,
Ulserik Moldanazarova,
Alberto Nicolis,
Riccardo Penco,
Walter Goldberger,
Matthew Reece
, et al. (12 additional authors not shown)
Abstract:
We summarize recent progress in the development, application, and understanding of effective field theories and highlight promising directions for future research. This Report is prepared as the TF02 "Effective Field Theory" topical group summary for the Theory Frontier as part of the Snowmass 2021 process.
We summarize recent progress in the development, application, and understanding of effective field theories and highlight promising directions for future research. This Report is prepared as the TF02 "Effective Field Theory" topical group summary for the Theory Frontier as part of the Snowmass 2021 process.
△ Less
Submitted 6 October, 2022;
originally announced October 2022.
-
Learning from Demonstrations of Critical Driving Behaviours Using Driver's Risk Field
Authors:
Yurui Du,
Flavia Sofia Acerbo,
Jens Kober,
Tong Duy Son
Abstract:
In recent years, imitation learning (IL) has been widely used in industry as the core of autonomous vehicle (AV) planning modules. However, previous IL works show sample inefficiency and low generalisation in safety-critical scenarios, on which they are rarely tested. As a result, IL planners can reach a performance plateau where adding more training data ceases to improve the learnt policy. First…
▽ More
In recent years, imitation learning (IL) has been widely used in industry as the core of autonomous vehicle (AV) planning modules. However, previous IL works show sample inefficiency and low generalisation in safety-critical scenarios, on which they are rarely tested. As a result, IL planners can reach a performance plateau where adding more training data ceases to improve the learnt policy. First, our work presents an IL model using the spline coefficient parameterisation and offline expert queries to enhance safety and training efficiency. Then, we expose the weakness of the learnt IL policy by synthetically generating critical scenarios through optimisation of parameters of the driver's risk field (DRF), a parametric human driving behaviour model implemented in a multi-agent traffic simulator based on the Lyft Prediction Dataset. To continuously improve the learnt policy, we retrain the IL model with augmented data. Thanks to the expressivity and interpretability of the DRF, the desired driving behaviours can be encoded and aggregated to the original training data. Our work constitutes a full development cycle that can efficiently and continuously improve the learnt IL policies in closed-loop. Finally, we show that our IL planner developed with less training resource still has superior performance compared to the previous state-of-the-art.
△ Less
Submitted 31 March, 2023; v1 submitted 4 October, 2022;
originally announced October 2022.
-
Wi-Closure: Reliable and Efficient Search of Inter-robot Loop Closures Using Wireless Sensing
Authors:
Weiying Wang,
Anne Kemmeren,
Daniel Son,
Javier Alonso-Mora,
Stephanie Gil
Abstract:
In this paper we propose a novel algorithm, Wi-Closure, to improve computational efficiency and robustness of loop closure detection in multi-robot SLAM. Our approach decreases the computational overhead of classical approaches by pruning the search space of potential loop closures, prior to evaluation by a typical multi-robot SLAM pipeline. Wi-Closure achieves this by identifying candidates that…
▽ More
In this paper we propose a novel algorithm, Wi-Closure, to improve computational efficiency and robustness of loop closure detection in multi-robot SLAM. Our approach decreases the computational overhead of classical approaches by pruning the search space of potential loop closures, prior to evaluation by a typical multi-robot SLAM pipeline. Wi-Closure achieves this by identifying candidates that are spatially close to each other by using sensing over the wireless communication signal between robots, even when they are operating in non-line-of-sight or in remote areas of the environment from one another. We demonstrate the validity of our approach in simulation and hardware experiments. Our results show that using Wi-closure greatly reduces computation time, by 54% in simulation and by 77% in hardware compared, with a multi-robot SLAM baseline. Importantly, this is achieved without sacrificing accuracy. Using Wi-Closure reduces absolute trajectory estimation error by 99% in simulation and 89.2% in hardware experiments. This improvement is due in part to Wi-Closure's ability to avoid catastrophic optimization failure that typically occurs with classical approaches in challenging repetitive environments.
△ Less
Submitted 23 November, 2022; v1 submitted 3 October, 2022;
originally announced October 2022.
-
Reliable Decision from Multiple Subtasks through Threshold Optimization: Content Moderation in the Wild
Authors:
Donghyun Son,
Byounggyu Lew,
Kwanghee Choi,
Yongsu Baek,
Seungwoo Choi,
Beomjun Shin,
Sungjoo Ha,
Buru Chang
Abstract:
Social media platforms struggle to protect users from harmful content through content moderation. These platforms have recently leveraged machine learning models to cope with the vast amount of user-generated content daily. Since moderation policies vary depending on countries and types of products, it is common to train and deploy the models per policy. However, this approach is highly inefficien…
▽ More
Social media platforms struggle to protect users from harmful content through content moderation. These platforms have recently leveraged machine learning models to cope with the vast amount of user-generated content daily. Since moderation policies vary depending on countries and types of products, it is common to train and deploy the models per policy. However, this approach is highly inefficient, especially when the policies change, requiring dataset re-labeling and model re-training on the shifted data distribution. To alleviate this cost inefficiency, social media platforms often employ third-party content moderation services that provide prediction scores of multiple subtasks, such as predicting the existence of underage personnel, rude gestures, or weapons, instead of directly providing final moderation decisions. However, making a reliable automated moderation decision from the prediction scores of the multiple subtasks for a specific target policy has not been widely explored yet. In this study, we formulate real-world scenarios of content moderation and introduce a simple yet effective threshold optimization method that searches the optimal thresholds of the multiple subtasks to make a reliable moderation decision in a cost-effective way. Extensive experiments demonstrate that our approach shows better performance in content moderation compared to existing threshold optimization methods and heuristics.
△ Less
Submitted 25 January, 2023; v1 submitted 15 August, 2022;
originally announced August 2022.
-
Virtual Reality Assisted Human Perception in ADAS Development: a Munich 3D Model Study
Authors:
Felix Bognar,
Markus Oster,
Herman Van der Auweraer,
Tong Duy Son
Abstract:
As the development of autonomous driving (AD) and advanced driver assistance systems (ADAS) progresses, the relevance of the comfort of users is gaining increasing interest. It becomes significant to test and validate perceived comfort performance from the early phase of system development before driving on roads. Most of the present ADAS test procedures are not efficient in performing such comfor…
▽ More
As the development of autonomous driving (AD) and advanced driver assistance systems (ADAS) progresses, the relevance of the comfort of users is gaining increasing interest. It becomes significant to test and validate perceived comfort performance from the early phase of system development before driving on roads. Most of the present ADAS test procedures are not efficient in performing such comfort evaluation. One of the main challenges is to integrate high-quality, realistic and predictable virtual traffic scenarios into an ADAS testing framework that has physics-based sensors capable of sensing the virtual environment. In this paper, we present our development of a virtual reality based ADAS testing framework that enhances human perception evaluation. The main contribution relies on three aspects. First, we introduce our development of a large and high-quality (realism, structure, texture) 3D traffic model of the Munich city in Germany. Second, we optimize the 3D model for virtual reality purpose, and real-time capable for human-in-the-loop ADAS testing. Finally, the model is then integrated into an ADAS framework for testing and validating ADAS functionalities and perceived comfort performance. The developed framework components are presented with illustrative examples.
△ Less
Submitted 22 August, 2022; v1 submitted 12 August, 2022;
originally announced August 2022.
-
Sim2real for Autonomous Vehicle Control using Executable Digital Twin
Authors:
Jean Pierre Allamaa,
Panagiotis Patrinos,
Herman Van der Auweraer,
Tong Duy Son
Abstract:
In this work, we propose a sim2real method to transfer and adapt a nonlinear model predictive controller (NMPC) from simulation to the real target system based on executable digital twin (xDT). The xDT model is a high fidelity vehicle dynamics simulator, executable online in the control parameter randomization and learning process. The parameters are adapted to gradually improve control performanc…
▽ More
In this work, we propose a sim2real method to transfer and adapt a nonlinear model predictive controller (NMPC) from simulation to the real target system based on executable digital twin (xDT). The xDT model is a high fidelity vehicle dynamics simulator, executable online in the control parameter randomization and learning process. The parameters are adapted to gradually improve control performance and deal with changing real-world environment. In particular, the performance metric is not required to be differentiable nor analytical with respect to the control parameters and system dynamics are not necessary linearized. Eventually, the proposed sim2real framework leverages altogether online high fidelity simulator, data-driven estimations, and simulation based optimization to transfer and adapt efficiently a controller developed in simulation environment to the real platform. Our experiment demonstrates that a high control performance is achieved without tedious time and labor consuming tuning.
△ Less
Submitted 12 August, 2022;
originally announced August 2022.
-
MPC-based Imitation Learning for Safe and Human-like Autonomous Driving
Authors:
Flavia Sofia Acerbo,
Jan Swevers,
Tinne Tuytelaars,
Tong Duy Son
Abstract:
To ensure user acceptance of autonomous vehicles (AVs), control systems are being developed to mimic human drivers from demonstrations of desired driving behaviors. Imitation learning (IL) algorithms serve this purpose, but struggle to provide safety guarantees on the resulting closed-loop system trajectories. On the other hand, Model Predictive Control (MPC) can handle nonlinear systems with safe…
▽ More
To ensure user acceptance of autonomous vehicles (AVs), control systems are being developed to mimic human drivers from demonstrations of desired driving behaviors. Imitation learning (IL) algorithms serve this purpose, but struggle to provide safety guarantees on the resulting closed-loop system trajectories. On the other hand, Model Predictive Control (MPC) can handle nonlinear systems with safety constraints, but realizing human-like driving with it requires extensive domain knowledge. This work suggests the use of a seamless combination of the two techniques to learn safe AV controllers from demonstrations of desired driving behaviors, by using MPC as a differentiable control layer within a hierarchical IL policy. With this strategy, IL is performed in closed-loop and end-to-end, through parameters in the MPC cost, model or constraints. Experimental results of this methodology are analyzed for the design of a lane keeping control system, learned via behavioral cloning from observations (BCO), given human demonstrations on a fixed-base driving simulator.
△ Less
Submitted 24 June, 2022;
originally announced June 2022.
-
Reinforcement Learning for Vision-based Object Manipulation with Non-parametric Policy and Action Primitives
Authors:
Dongwon Son,
Myungsin Kim,
Jaecheol Sim,
Wonsik Shin
Abstract:
The object manipulation is a crucial ability for a service robot, but it is hard to solve with reinforcement learning due to some reasons such as sample efficiency. In this paper, to tackle this object manipulation, we propose a novel framework, AP-NPQL (Non-Parametric Q Learning with Action Primitives), that can efficiently solve the object manipulation with visual input and sparse reward, by uti…
▽ More
The object manipulation is a crucial ability for a service robot, but it is hard to solve with reinforcement learning due to some reasons such as sample efficiency. In this paper, to tackle this object manipulation, we propose a novel framework, AP-NPQL (Non-Parametric Q Learning with Action Primitives), that can efficiently solve the object manipulation with visual input and sparse reward, by utilizing a non-parametric policy for reinforcement learning and appropriate behavior prior for the object manipulation. We evaluate the efficiency and the performance of the proposed AP-NPQL for four object manipulation tasks on simulation (pushing plate, stacking box, flipping cup, and picking and placing plate), and it turns out that our AP-NPQL outperforms the state-of-the-art algorithms based on parametric policy and behavior prior in terms of learning time and task success rate. We also successfully transfer and validate the learned policy of the plate pick-and-place task to the real robot in a sim-to-real manner.
△ Less
Submitted 12 June, 2022;
originally announced June 2022.